Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:26
Static task
static1
Behavioral task
behavioral1
Sample
68b0c4e0675a149a96a36b1afce98cfc_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
68b0c4e0675a149a96a36b1afce98cfc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68b0c4e0675a149a96a36b1afce98cfc_JaffaCakes118.html
-
Size
27KB
-
MD5
68b0c4e0675a149a96a36b1afce98cfc
-
SHA1
05c9e1be1481d9754b7744b8c45bbe906a94cda2
-
SHA256
b144e6a3267f4acb79b5fe7dce72b3736764c75ac77edbee76e02ca6620945a9
-
SHA512
6f3489773af0d9a8f848743104f18c1ec2716b505747cb10b5b5596529e5f19c0a6f215c08fc2b00a1d015c33d115edf65722f9570526beb0ca8165b153fb5ae
-
SSDEEP
192:uw/kb5nyiHnQjxn5Q/pnQiekNnAnQOkEntr7nQTbnxnQ9em9am60xUiQl7MBEqn2:KEQ/cLAKU1SGxB
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000ca31bd3ec0cd3b1f5c7220cdc42cb9e1ec3dc60de05ea973604d077663db726f000000000e8000000002000020000000c92659e9573f7ff78293004b8e984ede2e98ef578413a76231d5d7545b53321e20000000f6a846b8c302c3d74fe13cb7b9431a604153e72af2e65ee66cf03263477e6b8140000000a1beeaec61f1fcd28704aa31c76ffae7a3ac6d0773a94328aebf44ab93da8ca9be8c5af8241b41b1f56cb25e24fc4916d39697b00a2279f37837b8d60da963d5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F6DD22B1-1881-11EF-9A0E-5A3343F4B92A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422575062" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10ffb2cb8eacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid process 2948 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3000 iexplore.exe 3000 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3000 wrote to memory of 2948 3000 iexplore.exe IEXPLORE.EXE PID 3000 wrote to memory of 2948 3000 iexplore.exe IEXPLORE.EXE PID 3000 wrote to memory of 2948 3000 iexplore.exe IEXPLORE.EXE PID 3000 wrote to memory of 2948 3000 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68b0c4e0675a149a96a36b1afce98cfc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59efbf4bec9aed98397963fbac0162c17
SHA12c223605ec082abf3303d92985eca471f2b9eb18
SHA256fe63522e4f23eb0cbb70489e2bd719c63ae38dfcc71a12cd9b82f61d582a7a32
SHA512841b6619cb2ccd255c4b4d82cb4b428c5c209c8b76eb67019499ade919b2948cffd3b9226b886e09a33bf87d37ff8cad6ca825ecc9575db633efe4f5b4387a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d919edd88ba8473c695dbfa3d54075f
SHA129481d53193207c4f5889dded729de4a8a5d4f70
SHA256b03a8fcfb0c337759180857a9b9a72ca1f5be27d0a8c19d9f8180407c3302336
SHA51262752dc85c6002fbb0d424d9db76e7a716d108f59b824cab7b54b9413756154d1f08c1dd77e743c4ff241fd929e2c27d526bb8d36f8dc07d2380983801d3fb70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d361e6e06faaf16499ef71e295ed9595
SHA104d7a4fe04d4c048e0f3a0341f92a98ddf034253
SHA256d293787406089fbf80b84f2304edb2886bcea205b137607eaebfacf59a5e1f55
SHA512380d6bcd33c1a1e60ec9ea642d28bbe5f41245fa68fd59d49a216b50267a1fcb59f5afe52501157fa813f4072a6e79aea1d8d2350bb7f6b73733674ac223a640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b3a64e53ce76bfba2a436a05094b8d8
SHA114ac7953d484c22ecf8f398232f92a9bc31de28a
SHA25613d944af3deab47966ea444d196a2790c3c86ad9cf9b359f7b21dc572096df71
SHA512dd82174b8ae08ed7cb4d58ec150e4078b9f58a9638310fb7df571dc91cb478311232616395ad03757d09e684221236e936bdccfa588f4c3ffe65502eb2661b19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516d0eead5d6285ebfbeb9912a9275a0d
SHA1d61a5f97ba822e149e402e52a508f1cbe07794b4
SHA2567c90dd53c974e043957e0e1c59be9f57989a540fff34c76120bcff71968a250f
SHA512f0a53a82c17acf28be6286912f7e91e9b376a4b4cbb371e78e3c786b5f5b96ddf9460193b82bfd0468948bb09193e10c62223e221e0ad1e5c76a134fff00dbce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c9a0e66a09eee98a2a4661126ab029f
SHA15ab2b3efb0cb3460a930d8df8669985524e2cb61
SHA256016de1fa8f7c6194767a068278771c1d52c28b39f9fcd3b30dfc45e9bc9728c3
SHA512b31794b3f8df684aa212610303c34d6e039ddc36d32685061da53c3f0e78d5126bf869db7443506e7334aea13dd12b22330b2782bd8d96aeed0195fc8653bc2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544c12823d7b07340b4b61271c5a93e90
SHA18ddf748ab3dfacc8d51ba64a57550788fd32f478
SHA2561bebfdef9a46463952d983fa4709a1945efc5203adf86e282026242eabec944a
SHA512dc0ddaa391ef827f1a8145c74e3dc51bc54ecdf8a56aeb3685c1cc18a741e44bf39650c4adf69813f939885e1d810a2832d1a6fe8d720a0ef30ac7c5358cd942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c0acac243540ebc0a394a0d05d60ee2
SHA10a45a52286698cc076a16b910799650ba1bcc8dc
SHA25649b38cf4465501578fc23085047ec84e6471362caf26b3f7d21a918d94c97b51
SHA51269362c5ddd9b04460629db34893c561b04d7f77f19f2c662a5110320a22f428a3842a15d5e152b910144891ed26023f11a25223d325f44e24c2f7cb91fc1e78e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5850763113a83fb6faec999ab23eb6a4a
SHA155d56f8e6a38ac3cb7996998420f1f4c4947eac2
SHA256b14f66a1d35733950363811994dea96b77d73d7cb49e3d37d3268c670d2e7317
SHA5129795685f89c0aab971743f241bdbde7e20028bb58030d47baeceb498b9252b124b775ea45901e6feb679cfbf7e1a9d4fe5db41ddbfa2f2b5e21543a535c3c8d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f8463f696ec4d63771074ca5960c8e3
SHA14580e0486ad951d953cf73490b483db2c9fedde0
SHA256afb1feccaff09aae03e04cf429570272c581e2df64ab5840cfd607d41da1b416
SHA51295d903bfc5af0b52ec4bc1f579ea0994ccac07fc271ebcfd5222776ae72a205aa015788d1adf60dbb241ef2195882f0b6caaacfbb9e4323c2a50be97c8ec1dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548820be1101e9791b351acfd0b1e4ab3
SHA1c032bcefcca78ac20f90b19fe0009ee26c1c79fc
SHA2563273b0da05161bfce4e6ad8d18024d6e04113e58f9a77d4e80dc1a08be93eeb4
SHA51220c1e18417971bc1c76d9ca1621537ff25760e4ca660dca4e78dd09cb57fe13d0f9cb38622ee2e3d681739af4cca56ff53ea3fb220bcb1f12a97958d0af540ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5689a555e5b95f397cf9b9ab7299ecb7d
SHA1184efbe1036cfe3ba76a9f7de4cf3a0c022b19d3
SHA256a368455221083288073a57a680b89d2efc9c695e8e93a0a67e22b2df0f498b60
SHA512286df8433f97aa8cafaa2d0f93f098f47ac3b4ad9eaf0ba33d5570451a685d32b40f23d61baef7a56ff9b4fadc17a2f2a1b87f89c637e48c0855e37e7c1d8628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3a4e6513ced95d50aed908fc09a3c59
SHA131d9d8444373347d6969cbad18b52a3beb7a0217
SHA25674d6d9268294755228e6d057fd21ee0dc87bbcaaf75aca733b5fc4a4e5d5dea8
SHA5122e197b0512c7dde038bdf90bb433ad4058e6790e50954179e4c8130749274c32249fb92553ff77820659b8b60f402f3287e61f0166596ea97a7c148797504286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7f1167879d29035a0aa7b2cfd477746
SHA15b209b5b9e3c649e3aca765f8d5419f045f4eaef
SHA2569c11274d04445002152ec86ada131a9f213a78b7e1b34e35a1ce78180d6e6cc5
SHA5128b080f3519e50a3b8d57e96527cc5c01d70cdd73c910b366959b75b65b3f566b55414ec8ac71ecb63d5438186484641a28b574ab48676d19404f0ce525fb4a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5029ce5e2c39eed90c16cd59671fe71c7
SHA15f3b094c7d1cd3c17df64c4c68f9284ca84263ad
SHA256a4684ae6c47a962cffb46c4a13c8a350d8d9b08de99e0f7d56fc40a1321cfc4a
SHA5123cf0f8f22a92635c79432f3acec424a70dacb2a8d33eee772bf602f78f5566040325ca89358e43cb00cd014e8e4e0985160c2aad63f820453305e44998e545ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6394d88b62848d5bfdf2f7fa8a2b2c8
SHA127ddb4fdb6eedd759e1cb8fcccb73517e3d2d724
SHA25611241f1d7fd0c04e68fa81dc8c153515bdeeed345997273f846020b122241b70
SHA5123c7f7beec046f08bcf58e6cdc3ca54a376bdf2bbccff0331d78defa3d44d0ef11088531fb2840cef7d3583bde824981d412530a5decdbe0ad90891a42c58dee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5348865863e36cae003b2c362371f8cb1
SHA1129531f2faa82192a8a9eed9447789005db863de
SHA2568ce21443f792aed1eddc7171f761af835307fb85850f32b82f24b24bca384d3d
SHA512a1d5dbb19b4ebf61c71ae64811de434cedfe028cf9b7557705bf633c78151892b4960f6ee4142ffceadf7a07c20b83b47571583c36a0c68a86c85a297719d8b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564fcd3404e748417c2100d8f587a24cc
SHA1cd060bbe48918aa6937bef0240355bf86c580008
SHA2561fd19d01f6e4a39bb3ac97dbf8f37ef763271b36856a062085493218afe91f84
SHA512f0e5999f957a63e9c5287a399447aabf8d0a76798ea7bb685c5574a7d1b0fa662ff828b8b6a447e8845962cd9502c24e5edd51228f1fd6d6189c0171c2568d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dcf5ca7a58822d1bf999cf9803845e8
SHA1420a59d4bb71a3599c41e0558adb8a0bf962ddba
SHA2560139521cb0bdfc0e7d230048de646f0a61c0ca9048b017def14ab8de61b48d30
SHA512af6ab279a69fb60aabdc17db6abffe9d3763735731a9db9f40c7a6ccf8074bd029189ef7362b39eb7654f6711b08a835d03e6d7c5a03969dcbb051145b551865
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a